Use Kaspersky Security Network
Kaspersky Security Network (KSN) is an infrastructure of cloud services providing access to the Kaspersky online knowledge base that contains information about the reputation of files, web resources, and software. Kaspersky Security Network is intended for improving detection of viruses and other threats, spam and phishing links, as well as for receiving statistics used to detect threats.
If you do not want to transmit data of your organization over the Internet, you can use the Kaspersky Private Security Network service.
Kaspersky Private Security Network (KPSN) is a solution that lets you receive access to Kaspersky Security Network data via a server located within your organization's network. KPSN enables Kaspersky applications to receive access to the online Kaspersky Knowledge Base for information about the reputation of files, web resources, and software. KPSN does not transmit statistics and files to Kaspersky. For more detailed information, please refer to the Kaspersky Private Security Network Administrator's Guide.
The Kaspersky Private Security Network service was designed for corporate customers who are unable to participate in Kaspersky Security Network for any of the following reasons:
If this check box is selected, the application uses data from Kaspersky Security Network during a scan.
If this check box is cleared, Kaspersky Security Network is not used.
The check box is cleared by default.
The Use Kaspersky Security Network check box is available if the I accept the KSN Statement option is selected in the KSN Settings section in the Settings node. Use Kaspersky Security Network or the Use Kaspersky Private Security Network (KPSN) option. All settings of the Kaspersky Security Network service are applied to the Kaspersky Private Security Network service.
Maximum waiting time when requesting KSN
The maximum time of waiting for a response to a request of Kaspersky Security Network server (in seconds).
The default value is 5 sec.
This setting is available if the Use Kaspersky Security Network check box is selected.
Scan attached containers/archives
Enables the scanning of archived files.
If the check box is selected, Anti-Virus scans archived files.
If the check box is cleared, Anti-Virus skips archived files without scanning them.
The check box is selected by default.
Scan attached containers/archives with nesting level not higher than
Enables / disables scanning of containers and multi-packed archives.
In the Scan attached containers/archives with nesting level not higher than spin box, you can specify the number of nested levels that the application must scan. For example, an email message contains an archive with 13 nesting levels. If the setting value is 10, Anti-Virus unpacks and scans the archive only down to and including the 10th nesting level. Files located at deeper nesting levels are not scanned. The maximum file value is 128. The default value is – 32.
If the check box is selected, Anti-Virus scans containers and archives according to the nesting level specified.
The value of the Scan attached containers/archives with nesting level not higher than setting covers attachment filtering. During attachment filtering, the application also unpacks and scans containers and archives according to the specified nesting level.
If this check box is cleared, Anti-Virus skips containers and archives without scanning them. During attachment filtering, the application scans containers and archives down to the second nesting level.
The check box is selected by default.
Do not scan files matching the masks
Excludes files from the scan by file names and file name masks.
If this check box is selected, the application skips files that match names and / or name masks in the list. You can create a list of file name masks.
The following buttons are used to create the list of file name masks:
If the check box is cleared, the entry field, buttons and list are unavailable, and mask-based exemption of files from scanning is not used.
The check box is cleared by default.
This setting is considered during attachment filtering. Files that have been excluded from Anti-Virus scanning by file names and/or file name masks will also be excluded from attachment filtering.
Do not scan messages for the following recipients
Excludes messages addressed to recipients in the list from scanning.
If the check box is selected, you can form a list of trusted recipients.
Recipients can be typed in the entry field or selected from Active Directory. To exclude messages for the Hub Transport role from Anti-Virus scanning, email addresses should be entered in the user@domain.com format. Names that are displayed have to be entered for the Mailbox role.
The following buttons are used to create the list of trusted recipients:
If the check box is cleared, the entry field, buttons and list are unavailable, and messages are not excluded from scanning based on their recipients.
The check box is cleared by default.
Edit (Attachment deletion message following a virus scan)
Edit the information message that the application attaches to the original message if attachments are deleted based on the results of a virus scan.
Clicking this button opens the Message template window. In this window, you can edit the text that informs the user about the deletion of original attachments.
The default text includes a list of the deleted attachments presented by the %DELETED_OBJECT_LIST%
variable.
Edit (Attachment deletion message following a filter rule)
Edit the information message that the application attaches to the original message if attachments are deleted based on the results of attachment filtering.
Clicking this button opens the Message template window. In this window, you can edit the text that informs the user about the deletion of original attachments.
The default text includes a list of the deleted attachments presented by the %DELETED_OBJECT_LIST%
variable.
Use these settings for the following tasks Configuring anti-virus scan exclusions Configuring exclusions by recipient addresses |
See also |